Level: Beginner / Entry-Level
Prerequisites: Basic computer and internet skills; no prior cybersecurity experience required
Certification: Cisco Certified Support Technician โ Cybersecurity (Official Cisco Credential)
Delivery Partner: Thakral Global Learning
๐ Course Overview:
This course prepares learners for the Cisco Certified Support Technician โ Cybersecurity certification, which validates entry-level skills in protecting digital environments. Developed by Cisco and Certiport, this program is designed for aspiring cybersecurity professionals, students, and early-career individuals seeking to understand the principles of digital security, cyber threats, defense techniques, and ethical practices.
Learners gain hands-on exposure to cybersecurity tools, threat analysis, risk mitigation, and basic security policiesโbuilding a strong foundation for further career growth or advanced certifications like CompTIA Security+ or Cisco CCNA Security.
โ Learning Outcomes:
By the end of the course, learners will be able to:
- Understand the core concepts and vocabulary of cybersecurity
- Identify common threat types and vulnerabilities
- Explain basic security principles, models, and frameworks
- Apply cybersecurity practices in securing devices, networks, and data
- Use essential tools for threat detection and mitigation
- Prepare confidently for the Cisco CCST Cybersecurity certification exam
๐ Course Modules:
1. Essential Security Principles
1.1 Define essential security principles
- Vulnerabilities, threats, exploits, and risks
- Attack vectors; hardening; defense-in-depth
- Confidentiality, integrity, and availability (CIA)
- Types of attackers and reasons for attacks
- Code of ethics
1.2 Explain common threats and vulnerabilities
- Malware, ransomware, denial of service, botnets
- Social engineering attacks (tailgating, spear phishing, phishing, vishing, smishing)
- Physical attacks, man-in-the-middle
- IoT vulnerabilities, insider threats, Advanced Persistent Threats (APT)
1.3 Explain access management principles
- Authentication, authorization, and accounting (AAA)
- RADIUS, multifactor authentication (MFA)
- Password policies
1.4 Explain encryption methods and applications
- Types of encryption, hashing, certificates, public key infrastructure (PKI)
- Strong vs. weak encryption algorithms
- States of data and appropriate encryption (data in transit, data at rest, data in use)
- Protocols that use encryption
2. Basic Network Security Concepts
2.1 Describe TCP/IP protocol vulnerabilities
- TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS
2.2 Explain how network addresses impact network security
- IPv4 and IPv6 addresses, MAC addresses
- Network segmentation, CIDR notation, NAT
- Public vs. private networks
2.3 Describe network infrastructure and technologies
- Network security architecture, DMZ, virtualization, cloud
- Honeypot, proxy server, IDS, IPS
2.4 Set up a secure wireless SoHo network
- MAC address filtering, encryption standards and protocols, SSID
2.5 Implement secure access technologies
- ACL, firewall, VPN, NAC
3. Endpoint Security Concepts
3.1 Describe operating system security concepts
- Windows, macOS, and Linux
- Security features, including Windows Defender and host-based firewalls
- CLI and PowerShell; file and directory permissions; privilege escalation
3.2 Demonstrate familiarity with appropriate endpoint tools that gather security assessment information
- Netstat, nslookup, tcpdump
3.3 Verify that endpoint systems meet security policies and standards
- Hardware and software inventory, program deployment
- Data backups, regulatory compliance (PCI DSS, HIPAA, GDPR)
- BYOD (device management, data encryption, app distribution, configuration management)
3.4 Implement software and hardware updates
- Windows Update, application updates, device drivers, firmware, patching
3.5 Interpret system logs
- Event Viewer, audit logs, system/application logs, syslog
- Identification of anomalies
3.6 Demonstrate familiarity with malware removal
- Scanning systems, reviewing scan logs, malware remediation
4. Vulnerability Assessment and Risk Management
4.1 Explain vulnerability management
- Vulnerability identification, management, and mitigation
- Active and passive reconnaissance; port scanning, automation
4.2 Use threat intelligence techniques to identify potential network vulnerabilities
- Vulnerability databases, industry-standard tools for assessments
- CVEs, cybersecurity reports, and collective intelligence
4.3 Explain risk management
- Vulnerability vs. risk, ranking risks, risk mitigation strategies
- Risk levels (low, medium, high, extremely high)
- Security assessments of IT systems
4.4 Explain the importance of disaster recovery and business continuity planning
- Natural and human-caused disasters
- Disaster recovery plans (DRP) and business continuity plans (BCP)
- Backup, disaster recovery controls (detective, preventive, and corrective)
5. Incident Handling
5.1 Monitor security events and know when escalation is required
- Role of SIEM and SOAR
- Monitoring network data to identify security incidents
5.2 Explain digital forensics and attack attribution processes
- Cyber Kill Chain, MITRE ATT&CK Matrix, Diamond Model
- Tactics, Techniques, and Procedures (TTP)
- Evidence handling (preserving digital evidence, chain of custody)
5.3 Explain the impact of compliance frameworks on incident handling
- Compliance frameworks (GDPR, HIPAA, PCI-DSS, FERPA, FISMA)
- Reporting and notification requirements
5.4 Describe the elements of cybersecurity incident response
- Policy, plan, and procedure elements
- Incident response lifecycle stages (NIST Special Publication 800-61)
๐ ๏ธ Practical Tools & Simulations:
- Cisco Packet Tracer (for basic network security labs)
- Browser-based cybersecurity scenarios
- Security tools simulations: antivirus, password managers, firewall settings
- Cybersecurity games and challenges
๐ผ Career Opportunities:
- Cybersecurity Technician
- Security Support Associate
- IT Support with Cybersecurity focus
- SOC Analyst (Entry-Level)
- Pathway to roles like Cybersecurity Analyst, Ethical Hacker, or Network Security Specialist
๐ Why Choose Thakral Global Learning?
- Official Cisco-aligned curriculum delivered by experienced trainers
- Hands-on, skills-based learning
- Guided exam preparation for CCST Cybersecurity
- Access to Cisco and Certiport learning materials
- Personalized mentorship and career advice